Broadband Wireless Access / Nejlevnější knihy
Broadband Wireless Access

Kód: 02717078

Broadband Wireless Access

Autor Benny Bing

This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmiss ... celý popis

5060


Skladem u dodavatele
Odesíláme za 14-18 dnů
Přidat mezi přání

Mohlo by se vám také líbit

Dárkový poukaz: Radost zaručena

Objednat dárkový poukazVíce informací

Více informací o knize Broadband Wireless Access

Nákupem získáte 506 bodů

Anotace knihy

This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmissions. Ato neextreme is random access where no coordinationis provideda ndp acket collisions arep ossible. Atthe other endo fthe spectrum, the class of fixed assignment access protocols eliminates collisions entirely butpay the price ofadditional overhead required forscheduling user access. Hybrid access protocolsb etweenthese two extremes exist While these protocols attempt to combine the advantages ofrandom andfixed access, they also suffer the c ombined drawbacks and overhead ofboth classes of access schemes. Amongt he many factors that determine the performance ofa n access protocol include the propagation delay/packet transmission timeratio, the message arrival process, the types of feedback information available, the user population, and the ability of the user to sense the activities in the network. BIBLIOGRAPHY [ABRA93] Abramson, N. , Multiple Access Communications , IEEE Press, 1993. [BERT92] Bertsekas, D. and Gallager, R. , Data Networks , Prentice Hall, 1992. [CHOU83]Chou,W, ComputerCommunications Volume1:Principles , Prentice Hall, 1983. [CIDO87] Cidon, I. andSidi, M. , Erasures and Noise in Splitting Multiple Access Algorithms , IEEE Transactions on Information Theory, Vol. 33, No. 1, January 1987, pp. 132 140. [CIDO88] Cidon, I, Kodesh, H. and Sidi, M. , Erasure, Capture and Random Power Level Selectionin Multiple Access Systems , IEEE Transactions on Communications , Vol. 3 6,N o. 3,March 1988, pp. 263 271.

Parametry knihy

Zařazení knihy Knihy v angličtině Computing & information technology Computer networking & communications WAP networking & applications

5060

Oblíbené z jiného soudku



Osobní odběr Praha, Brno a 12903 dalších

Copyright ©2008-24 nejlevnejsi-knihy.cz Všechna práva vyhrazenaSoukromíCookies


Můj účet: Přihlásit se
Všechny knihy světa na jednom místě. Navíc za skvělé ceny.

Nákupní košík ( prázdný )

Vyzvednutí v Zásilkovně
zdarma nad 1 499 Kč.

Nacházíte se: